12 True Tales from Gen Keith Alexander about Creepy NSA Cyberstalking

The NSA has released some details of 12 incidents in which analysts used their access to America’s high-tech surveillance infrastructure to spy on girlfriends, boyfriends, and random people they met in social settings. It’s a fascinating look at what happens when the impulse that drives average netizens to look up long-ago ex-lovers on Facebook is … Read more

How to build the BGP UPDATE packet

bgp-update-create is a small program used to generate the payload of a BGP UPDATE message. It was written to test if routes could be injected in a BGP conversation between two routers. It’s usage is very simple; it takes three parameters: –as: Autonomous System number –nexthop: Host name or IP address of next hop –destnet: … Read more

How to find the JETPLOW on Cisco firewalls installed

JETPLOW is a firmware persistence implant for Cisco PIX Series and ASA (Adaptive Security Appliance) firewalls. It persists DNT’s BANANAGLEE software implant. JETPLOW also has a persistent back-door capability. JETPLOW is a firmware persistence implant for Cisco PIX Series and ASA (Adaptive Security Appliance) firewalls. It persists DNT’s BANANAGLEE software implant and modifies the Cisco … Read more

Why the Russian Hackers strikes back

The Russian Federation holds an interesting, albeit a dubious position in the ranks of nation state cyber-actors. While ranked third among countries in terms of volume of cyber activity (behind the U.S. and China, according to Deutsche Telekom’s honeypot network data), Russia is widely regarded as a having the most sophisticated and skilled hackers. Unlike … Read more